Day 2 - 18 March 2020
Operational 5G: Chair’s Welcome & Opening Remarks
5G, the benefits and the challenges
- Latency, network slicing
- Acceleration of existing technologies
- Barriers, gaps in connectivity
Panel: Unlocking the potential of 5G
- What will be the main enterprise value & business outcomes of 5G?
- How 5G will affect the holy quintet; capacity, reliability, latency, bandwidth and efficiency?
- What can we do now to prepare for the full rollout?
- 5G in five years time, where will we be?
Massive IoT and the 5G Revolution
This talk will look at how the combination of Massive IoT and new 5G technology will improve both the connectivity speed and coverage to drive IoT to achieve its full potential.
Big Data Analytics in 5G
With the dawn of 5G promising enabled intelligent network and application services with connectivity to remote sensors, big data analytics will be at the forefront of the evolution of 5G standards. This talk will look at the role of analytics in the context of 5G.
Deploying AI in 5G networks
The deployment of AI into 5G networks is still in the very early stages. This talk will look at the potential that these convergent technologies hold, and how they will be applied when ready
5G, IoT & Blockchain: collaboration is key
Collaboration will be crucial in minimising the disturbance that will be caused by the increase in digitalisation that will be bought forth with 5G. This talk will discuss how with the advent of the 5G revolution, blockchain would be capable of amassing more and more data via 5G-powered, IoT-enabled devices.
Panel: Edge computing architecture as an enabler for 5G
The widespread adoption of 5G by individuals and companies is not expected until 2020. This panel discussion will look at the importance of integration edge computing architecture now, in order to be prepared for when the 5G revolution truly begins.
5G and the Future of Cybersecurity Strategy
Offering speeds anywhere from 20 to 100 times faster than 4G long-term evolution (LTE), the next generation of wireless networks will also support higher capacities of wireless devices. As more and more devices are powered on and synced up, each one becomes a potential security vulnerability for the wider network. This talk will look at the considerations that this will bring with regards cybersecurity strategy and how this can be pre-empted.